Transaction Laundering – a Growing Threat in the Payments Industry

Total Page:16

File Type:pdf, Size:1020Kb

Transaction Laundering – a Growing Threat in the Payments Industry WHITE PAPER TRANSACTION LAUNDERING – A GROWING THREAT IN THE PAYMENTS INDUSTRY Abstract Nientibus et harum la aliquos que dunt harunte nat qui assimin ctincti nimoloratur? Quis sin enim expello rescitis aliberiosam, sumendu cienimil es ab in pelibus antiunt, eatur sit volorec tetur, occus asi suntiss imporer eperis dolupta que quid quatis mo volorit quas maio. Im acest, eos si beat. Ur? Nonseque reribus. Itatium re, nissi nullupietur audis sit adis con non corrum fugias eosae nones nonsenimus Itate esto moluptatur autatis sinctota dolent labo. Sum autem reriossum eos acerestectur rem que et haribus vel etur What is transaction laundering? Transaction laundering is an activity through which entities, unknown to a merchant acquirer, process their payments through the facilities provided by the acquirer to a known merchant. It is a criminal activity which violates the agreement that the merchant had with its acquirer. The method of using legitimate websites as a front is being used by criminals to conduct illegal activities, such as sale of counterfeit products, drugs and weapons trade, illegal pharmaceuticals, illicit pornography, unlicensed gambling, money laundering, and terrorism financing. It creates a situation where Merchant Service Providers (MSP – a collection of banks, acquirers, and payment processors) unknowingly become party to illegal activities and facilitate money laundering. This not only damages their reputation, but also makes them vulnerable to excessive chargebacks, legal actions, and regulatory penalties. Transaction laundering is sometimes referred to as ‘unauthorized aggregation’ or ‘undisclosed aggregation’ or ‘factoring’. This is because of the way illegal payments from one or more unknown sites are aggregated to be processed through a single legal merchant account. However, “aggregation” is a legitimate payments model using which small and medium businesses rely upon payment aggregators to take credit and debit card payments from their customers. Thus the term ‘transaction laundering’ became popular which indicates that the payment transaction itself is altered to launder money. The ultimate penalty is borne by the acquiring bank of a merchant indulging in transaction laundering, either knowingly or unknowingly. Regulations require the MSP to verify the legal identity of their customers and identify the Ultimate Beneficial Owner (UBO) of that entity. However, traditional Know Your Customer (KYC) still focuses on physical aspects of the legal entity as opposed to the digital aspects, making the payments area extremely vulnerable to transaction laundering. External Document © 2018 Infosys Limited How big is this threat? which about three percent are involved in in Paris in 2015 was aided by transaction illegal activities. laundering. According to EverCompliant, which is a According to a research by pymnts.com, solution provider in this space, US$155 G2, another solution provider who has been monitoring merchant content for more than 25 percent of terminated billion was generated from online sales the last 11 years, has found out that an accounts come back into the payment via transaction laundering in 2016 in average of 1.5 percent of a client’s portfolio system in a disguised manner with nearly no the USA alone. In addition, banks are contains illegal or unknown websites. change in their operations. About 50 percent processing about six percent to ten percent of websites involved in unlawful activities do of unauthorized e-commerce sites, out of In fact, the Charlie Hebdo terrorist attack not register for merchant accounts. Why is transaction laundering difficult to detect? Although this method of money laundering may seem simple, it is not very easy to detect through traditional means due to the following reasons: 1. Complexity of the payments chain: There can be several combinations of a payment cycle involving the shopping cart, payment gateway, payment processor, and bank where the payment may go through multiple gateways or payment processors. Hence, it is very difficult to differentiate legitimate transactions from the illegitimate ones 2. Inability to safeguard websites: Some merchants may not realize that their websites are being used for illegal transactions either through their affiliate programs or simply by using their website as a shadow site 3. Numerous unreported websites: Transaction violations maybe done through hidden websites that the bank may not know and therefore may not monitor. Traditional monitoring methods do not catch unreported websites 4. Growing use of corporate credit cards in business to business (B2B) payments: It has seen a growth of 25 percent till 2016 and is expected to grow at least at a rate of 10 percent y-o-y till 2018. Some of these corporate credit cards offer attractive cash backs making it a more preferred option over Automated Clearing House (ACH). Therefore, it is now common to have a large payment (running into thousands of dollars) being done via a single transaction, making it difficult to single out malicious transactions. External Document © 2018 Infosys Limited Why it has become an increased threat in recent years? In recent times, the threat of transaction e-merchants and payment facilitators 2. Factors that do not deter enough: laundering has increased due to two which provide a good degree of a. Fraudsters are finding it difficult to launder primary reasons – i) rapid increase in anonymity money through traditional means (cash, mechanisms that aid in this activity, and c. Banks have outsourced the high-cost wires, ACH) given the sophisticated and ii) the checks to detect them are unable to customer and merchant acquisition mature monitoring systems that exist keep pace. to payment service providers and for such payment methods. However for credit cards, the focus has typically been 1. Factors that aid transaction facilitators, who do not have the same degree of risk management and on frauds as opposed to money laundering laundering: monitoring capabilities b. Current regulations are attuned largely to a. Creating a professional-looking d. There has been a sudden surge in lines of business such as banking, capital website to sell goods along with alternate payment methods, such as markets, and insurance or products such as a checkout page and credit card digital wallets, payment processors, wires, cash deposits, and securities trading. profile has become very easy and payment gateways, which do not Payments and ‘card not present’ credit enabling criminals to create an online have a very good monitoring solution, card transactions are the blind spots in the marketplace swiftly. Criminals do not giving a fraudster newer avenues to world of anti-money laundering (AML) have to create actual brick-and-mortar launder money c. Merchant acquirers are not governed by storefronts to launder money. Thus, e. It has become an attractive avenue to the same level of Bank Secrecy Act (BSA) all three steps of money laundering – generate additional revenue, either / AML requirements as those of banks. placement, layering, and integration through abuse of affiliate programs or They focus on monitoring transactions can be done digitally by being complicit to the crime along for chargebacks only, instead of money b. There has been a substantial growth in with a launderer laundering External Document © 2018 Infosys Limited What are the types of transaction laundering? Transaction laundering can be done in various ways and its typical growth trend is given in Exhibit 1. Scope of traditional monitoring systems 4 Combination of traditional laundering and complicit merchants Illicit money gets legally transferred to criminal’s account 1 Malicious competitor either within or outside country Framing: Harvest merchant Have legitimate cash- credentials and use that to Payment Service Encash money from Acquiring Bank intensive merchant buy perform malicious operations Provider prepaid card into fictitious product from criminal’s account via ACH complicit online merchant Disclosed aggregation merchant Transaction laundering (Online) Funnel Account: Illegal business related credit card Collude with legitimate Buy prepaid card from Smurfing charges funneled as legitimate cash-intensive firms legitimate merchant Laundering without without the Laundering knowledge merchant’s Traditional (In-person) Registered Affiliate Merchant-based money laundering Sell drugs/illegal items for Affiliate Fraud: Use harvested cash or via earlier methods credit card credentials to make Registered Merchant purchases and earn “points” Traditional & Transaction laundering (In-person & Online) Non-registered Criminal owned merchants registered merchant Pass-through: Forcibly embed Front business (direct): merchant payment link in Directly selling illegal item in illegal website disguise via registered site 2 3 Criminal owned Owning the merchant business and Laundering with the Undisclosed Undisclosed merchant using it as a “front” merchant’s knowledge aggregation merchant Corrupt merchant: Partner with Front business (indirect): Several other functionally and visually corrupt merchants who allow use Unauthorized website selling similar websites were created with of their payment accounts for illegal items using registered different acquiring banks and PSPs illegal sales, for a fee merchant account Exhibit 1: The evolution of transaction laundering External Document © 2018 Infosys Limited 1. Merchant is unaware 2. Merchant is aware and i. Front business (direct): This is where complicit the ‘front’
Recommended publications
  • VISA Europe AIS Certified Service Providers
    Visa Europe Account Information Security (AIS) List of PCI DSS validated service providers Effective 08 September 2010 __________________________________________________ The companies listed below successfully completed an assessment based on the Payment Card Industry Data Security Standard (PCI DSS). 1 The validation date is when the service provider was last validated. PCI DSS assessments are valid for one year, with the next annual report due one year from the validation date. Reports that are 1 to 60 days late are noted in orange, and reports that are 61 to 90 days late are noted in red. Entities with reports over 90 days past due are removed from the list. It is the member’s responsibility to use compliant service providers and to follow up with service providers if there are any questions about their validation status. 2 Service provider Services covered by Validation date Assessor Website review 1&1 Internet AG Internet payment 31 May 2010 SRC Security www.ipayment.de processing Research & Consulting Payment gateway GmbH Payment processing a1m GmbH Payment gateway 31 October 2009 USD.de AG www.a1m.biz Internet payment processing Payment processing A6IT Limited Payment gateway 30 April 2010 Kyte Consultants Ltd www.A6IT.com Abtran Payment processing 31 July 2010 Rits Information www.abtran.com Security Accelya UK Clearing and Settlement 31 December 2009 Trustwave www.accelya.com ADB-UTVECKLING AB Payment gateway 30 November 2009 Europoint Networking WWW.ADBUTVECKLING.SE AB Adeptra Fraud Prevention 30 November 2009 Protiviti Inc. www.adeptra.com Debt Collection Card Activation Adflex Payment Processing 31 March 2010 Evolution LTD www.adflex.co.uk Payment Gateway/Switch Clearing & settlement 1 A PCI DSS assessment only represents a ‘snapshot’ of the security in place at the time of the review, and does not guarantee that those security controls remain in place after the review is complete.
    [Show full text]
  • How Mpos Helps Food Trucks Keep up with Modern Customers
    FEBRUARY 2019 How mPOS Helps Food Trucks Keep Up With Modern Customers How mPOS solutions Fiserv to acquire First Data How mPOS helps drive food truck supermarkets compete (News and Trends) vendors’ businesses (Deep Dive) 7 (Feature Story) 11 16 mPOS Tracker™ © 2019 PYMNTS.com All Rights Reserved TABLEOFCONTENTS 03 07 11 What’s Inside Feature Story News and Trends Customers demand smooth cross- Nhon Ma, co-founder and co-owner The latest mPOS industry headlines channel experiences, providers of Belgian waffle company Zinneken’s, push mPOS solutions in cash-scarce and Frank Sacchetti, CEO of Frosty Ice societies and First Data will be Cream, discuss the mPOS features that acquired power their food truck operations 16 23 181 Deep Dive Scorecard About Faced with fierce eTailer competition, The results are in. See the top Information on PYMNTS.com supermarkets are turning to customer- scorers and a provider directory and Mobeewave facing scan-and-go-apps or equipping featuring 314 players in the space, employees with handheld devices to including four additions. make purchasing more convenient and win new business ACKNOWLEDGMENT The mPOS Tracker™ was done in collaboration with Mobeewave, and PYMNTS is grateful for the company’s support and insight. PYMNTS.com retains full editorial control over the findings presented, as well as the methodology and data analysis. mPOS Tracker™ © 2019 PYMNTS.com All Rights Reserved February 2019 | 2 WHAT’S INSIDE Whether in store or online, catering to modern consumers means providing them with a unified retail experience. Consumers want to smoothly transition from online shopping to browsing a physical retail store, and 56 percent say they would be more likely to patronize a store that offered them a shared cart across channels.
    [Show full text]
  • Credit Card Processing Services RFP
    City of York Credit Card Processing Services RFP Questions & Answers 1. What type of equipment do you currently use to process Credit card transactions? (Please provide the Model Number and how many of each Terminal type there is – some model number examples include Vx510, FD55, FD130, Hypercom T7P, etc. The City of York does not own the equipment currently in use. All equipment must be returned to the current service provider upon termination of services. 2. Is there any requirement to interface with an existing legacy system? The City York currently uses Microsoft Dynamics AX; therefore data exports should be one of the following file formats: fixed field, tab delimited or comma delimited so that it interfaces with SK Global. 3. How many merchant IDs does the City of York currently have? And are you looking to keep the same numbers of merchant IDs? There are two merchant IDs, one for The City of York and one for the General Authority which operates the City’s public parking system; there is no desire to add additional IDs. 4. Will each merchant account fall under the same EIN number? Or does the City of York used different EIN numbers for different sectors accepting credit cards? Each merchant Id will have its own EIN. 5. How many current physical locations within York accept Credit, Debit, or E-Check? a. How many Retail locations, internet locations/websites? b. How many mail order/telephone order locations? c. Do you anticipate any new locations that will need to begin Credit Card acceptance? There are 7 locations that accept credit cards; 3 garages, 209 parking meters that accept credit cards.
    [Show full text]
  • CUT the PURSE STRINGS: Using a Notice of Infringement
    Cut the Purse Strings USING A NOTICE OF INFRINGEMENT TO CREDIT CARD COMPANIES AND PAYMENT PROCESSORS AS AN ENFORCEMENT TOOL About the Presenters Gerald C. Pia, Jr., and Brian C. Roche Roche Pia LLC Roche Pia LLC is a boutique Cyberlaw firm representing clients in the areas of Intellectual Property (Copyright, Trademark), Internet Piracy/Counterfeiting, Domain Name Disputes, Computer Crimes, Trade Secrets and Non-Competes, Internet Business Consulting, and Litigation. Representative clients in the Testing Industry include: Cisco Systems, Inc., Microsoft Corporation, Project Management Institute, Inc., Graduate Management Admission Council (GMAC), and Alpine Testing Solutions. About the Presenters (continued) Brent Hill and Brent Morris Cisco Systems, Inc. Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Cisco's networking solutions connect people, computing devices and computer networks. Cisco develops, manufactures and sells networking hardware, telecommunications equipment, and high-technology services, and provides high level IT certifications other high-technology services and products. Cisco certifications validate your ability to use the best-in-class networking and business communications devices from Cisco Systems. Brent Hill and Brent Morris manage Cisco’s Exam Security team to protect the integrity and the brand of the entire Cisco Certification program. Cisco’s Certification Program Cisco’s Certification Landscape Cisco’s Certification Exam Security Program Size: Methodology 200+ Exams
    [Show full text]
  • Credit Card Fraud: a New Perspective on Tackling an Intransigent Problem
    Fordham Journal of Corporate & Financial Law Volume 16 Issue 4 Article 2 2011 Credit Card Fraud: A New Perspective On Tackling An Intransigent Problem Lydia Segal Benjamin Ngugi Jafar Mana Follow this and additional works at: https://ir.lawnet.fordham.edu/jcfl Part of the Consumer Protection Law Commons Recommended Citation Lydia Segal, Benjamin Ngugi, and Jafar Mana, Credit Card Fraud: A New Perspective On Tackling An Intransigent Problem, 16 Fordham J. Corp. & Fin. L. 743 (2011). Available at: https://ir.lawnet.fordham.edu/jcfl/vol16/iss4/2 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Journal of Corporate & Financial Law by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. Credit Card Fraud: A New Perspective On Tackling An Intransigent Problem Cover Page Footnote Lydia Segal is an Associate Professor of Business Law and Ethics at Suffolk University’s Sawyer Business School. With degrees from Harvard Law School and Oxford, her specialty is organizational stewardship and integrity. Her latest book is Battling Corruption in America’s Public Schools (Harvard University Press). ** Dr. Benjamin Ngugi, is an Associate Professor in the Information Systems and Operations Management Department at Suffolk University’s Sawyer Business School. He received his Ph.D. in Information Systems from New Jersey Institute of Technology and his bachelors degree in Electrical and Electronics Engineering from University of Nairobi, Kenya. He conducts his research in the areas of identity fraud, biometrics, security compliance, e-Health security and technology adoption.
    [Show full text]
  • How Online Payments Really Work
    Insights for Businesses How Online Payments Really Work If you’re thinking about setting up an online store, you’re in good company. Shoppers are increasingly turning to online options, as their access to technology and their comfort with current technology grows. Businesses that want to compete effectively need to set up their online shops to allow their customers to check out quickly and securely. The success of your online business starts with making smart choices about payment processing. So, we’ve put this document together to help walk you through the process of setting up online payments and finding the best-possible pricing and partners for your business. If you’re unfamiliar with some of the payment terms we’re using, just check the Quick Reference Guide at the end for full definitions and additional tips. How Online Payments Really Work | 1 The Players 1 Who and what enables payments and delivery Meet the partners that help you get paid. When you’re ready to start accepting credit and debit cards, you’re bound to encounter many of these characters in the payments landscape—from the technology pieces at work to help you take payments to the institutions that process and protect them. The Merchant (That’s You) The Technology Your Customers When you get started, you may work A payment gateway connects your The beauty of electronic payment with a merchant bank (aka merchant website to the payment processor processing is that it’s all behind the acquirer) that will set you up with a (effectively connecting you to your scenes from your customers’ point of merchant account—which links to customer)—moving money from a view—they just check out and it’s fast your payment processor, enabling consumer’s account via an issuer into and secure.
    [Show full text]
  • Glossary of Payment and Information Security Terms
    PAYMENT CARD INDUSTRY SECURITY STANDARDS COUNCIL Glossary of Payment and Information Security Terms DATA SECURITY ESSENTIALS FOR SMALL MERCHANTS A PRODUCT OF THE PAYMENT CARD INDUSTRY SMALL MERCHANT TASK FORCE VERSION 2.0 | AUGUST 2018 Introduction This Glossary of Payment and Information Security Terms is a supplement to the Guide to Safe Payments, part of the Data Security Essentials for Small Merchants. Its intent is to explain relevant Payment Card Industry (PCI) and information security terms in easy-to-understand language. Definitions for terms marked with an asterisk (*) are based on or derived from definitions in the Payment Card Industry (PCI) Data Security Standard (DSS) and Payment Application Data Security Standard (PA-DSS): Glossary of Terms, Abbreviations, and Acronyms. The latest version of this glossary is considered the authoritative source, and must be referred to for the current and complete PCI DSS and PA-DSS definitions. Please refer to the Data Security Essentials for Small Merchants at the following: RESOURCE URL Guide to Safe Payments https://www.pcisecuritystandards.org/pdfs/Small_ Merchant_Guide_to_Safe_Payments.pdf Common Payment Systems https://www.pcisecuritystandards.org/pdfs/Small_ Merchant_Common_Payment_Systems.pdf Questions to Ask Your Vendors https://www.pcisecuritystandards.org/pdfs/Small_ Merchant_Questions_To_Ask_Your_Vendors.pdf Evaluation Tool https://www.pcisecuritystandards.org/merchants/ This tool is provided for merchant information only. An option for merchants is to use it as a first step to gain insight about security practices relevant to the way they accept payments, to provide their initial responses, and to see their results. Data Security Essentials for Small Merchants: Glossary of Payment and Information Security Terms | August 2018 Copyright 2018 PCI Security Standards Council, LLC.
    [Show full text]
  • Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors to Online Payment Processors Erika Douglas
    Michigan Telecommunications and Technology Law Review Volume 24 | Issue 1 2017 PayPal is New Money: Extending Secondary Copyright Liability Safe Harbors to Online Payment Processors Erika Douglas Follow this and additional works at: https://repository.law.umich.edu/mttlr Part of the Commercial Law Commons, Intellectual Property Law Commons, Internet Law Commons, and the Legislation Commons Recommended Citation Erika Douglas, PayPal is New Money: Extending Secondary Copyright Liability Safe Harbors to Online Payment Processors, 24 Mich. Telecomm. & Tech. L. Rev. 45 (2017). Available at: https://repository.law.umich.edu/mttlr/vol24/iss1/3 This Article is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Telecommunications and Technology Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. PAYPAL IS NEW MONEY: EXTENDING SECONDARY COPYRIGHT LIABILITY SAFE HARBORS TO ONLINE PAYMENT PROCESSORS Erika Douglas* Cite as: Erika Douglas, PayPal is New Money: Extending Secondary Copyright Liability Safe Harbors to Online Payment Processors, 24 MICH. TELECOM. & TECH. L. REV. 45 (2017). This manuscript may be accessed online at repository.law.umich.edu. ABSTRACT The Digital Millennium Copyright Act (DMCA) has shaped the Internet as we know it. This legislation shields online service providers from secondary copyright infringement liability in exchange for takedown of infringing content of their users. Yet online payment processors, the backbone of $300 billion in U.S. e-commerce, are completely outside of the DMCA’s protection.
    [Show full text]
  • Payment Terminal Service Aggregator
    Payment Terminal Service Aggregator andWelbie enraged is switch: her raider.she flakes Psephological omnivorously and and subspinous moan her Geri copilots. nicknaming Jean is some pulsatile: animalisation she overshoots so flashily! homewards Credit card terminal service aggregator Can POS be tracked? Pros and Cons of wrong Payment Aggregator High Risk Merchant. The threshold also offers its SIM solution services through multi-brand POS terminal offerings such as. This Agreement consists of question Card Services Terms Conditions and the. How to choose the did card payment services for sufficient business. Stripe's customer service called Terminal provides both online and offline services to visit merchant customers This solution includes a card reader. INTRODUCTION Sefton Fross. Dare Ayanwale Head Payment water Service Aggregator. Payment Aggregators are service providers through which e-commerce. Plus the duration payment volume contract business conducted through date payment service reached 2137. Which payment processor is best? Agreement Global Payments. Payment aggregators enables merchants to accept credit card company bank transfer. The page contains ICICI Merchant Services IMS IMS Payment Solutions. Nigeria PoS Transactions Drop in January by N16Bn. With this i we can perform ACH transactions and we then handle payments online. Wallet Aggregator Platform is a load full support solution which. Payment saying a secure encrypted channel like traditional PoS terminal digital QR code. What luxury A Payment Aggregator And personnel Would something Need One Blog. Stripe Terminal works with Stripe Payments Connect and Billing. NIBSS is also order Payment Terminal Services Aggregator It acts both observe a semi-regulator and service major player NIBSS has different products across.
    [Show full text]
  • X-Border Tracker January 2016 FINAL[1]
    ! PYMNTS.com A MONTHLY UPDATE ON THE TRENDS AND PLAYERS JANUARY 2016 ALLIED WALLET ADDS JIGOSHOP AND SHOPPERPRESS TRANSPAY BREAKS INTO TOP 10" SWIFT TO LAUNCH GLOBAL GLOBAL PAYMENT ALIBABA ECOMMERCE INNOVATIVE PROJECT STAYS OFF TO EXCEED US’ $3.5 TRILLION BLACKLIST BY 2019 PAYVISION INVESTS IN PAYPLAZA FOR UNIFIED CROSS BORDER OMNICHANNEL STRATEGY © 2016 PYMNTS.COM | ALL RIGHTS RESERVED PAGE !1 OF !51 ! PYMNTS.com COVER STORY Dear Merchants, Get Your Wares, Nigeria Is Open for Business Don’t look now, but retail is exploding in Nigeria. There are 18 malls in Nigeria spanning over 10,000 square meters today, and the country plans to add another 180,000 square meters of retail space by 2016. An expanding middle class population with the propensity and means to spend is creating a consumer demand that is outpacing the supply. Nigeria has one of the fastest population growth rates of any country in the world – coupled with a rapid urban expansion. The United Nations estimates Nigeria’s population to increase from 180 million to 400 million by 2050, placing it behind only India and China. A recent New York Times article reported estimates of Nigeria’s middle class growing by 600 percent from 2000 to 2014. The article, citing statistics provided by Standard Bank, notes that 4.1 million Nigerian households are now considered middle class (11 percent of the total population), while an additional 7.6 million households are expected to join that category by 2030. A McKinsey report in 2013 noted that 11 to 18 percent of affluent urban households had the purchasing power and annual incomes over $10,000.
    [Show full text]
  • Payments Orchestration Layer Necessary Functionality in the Payments Stack August 22, 2019
    Payments Orchestration Layer Necessary functionality in the payments stack August 22, 2019 RPGC Strategy Note Series ABSTRACT: This white paper presents the business case for enterprise merchants to utilize an abstraction layer that consolidates payments functionality into a single business-oriented architecture. The payments ecosystem is complex, exacerbated by fragmentation. No single Payment Service Provider can fully service every market and each merchant must develop the exact same logic and requirements to comply with the changes imposed by the card schemes. In-house solutions are typically engineering driven and since payments expertise is rare among engineers, most legacy architecture is manual and burdensome on IT. The proposed business-oriented architecture, called a Payments Orchestration Layer (POL), addresses these above challenges. POLs are built on four key pillars of global connectivity, smart routing, real-time ledgers and end-user tools. This architecture allows merchants to use payments to further pursue their goals of enhancing the customer experience, lowering costs and supporting market growth. Copyright © 2019 Retail Payments Global Consulting, L.L.C. All rights reserved. The Need for a Payment Orchestration Layer 1. THE PROBLEM STATEMENT Payments do not exist for their own sake. The payments function is the merchant’s revenue gathering platform that must balance three overarching business goals: • Enhance the customer experience, increasing sales by maximizing approval rates and mitigating the effect of outages. • Support growth by connecting to multiple endpoints1 that enable customers to pay using the currencies and forms of payment which they prefer. • Lower the cost of payment processing and operations and thereby contributing to the company’s bottom line.
    [Show full text]
  • How to Select an Association Credit Card Processor How to Select an Association Credit Card Processor How to Select an Association Credit Card Processor
    HOW TO SELECT AN ASSOCIATION CREDIT CARD PROCESSOR HOW TO SELECT AN ASSOCIATION CREDIT CARD PROCESSOR HOW TO SELECT AN ASSOCIATION CREDIT CARD PROCESSOR AN EASY-TO-UNDERSTAND GUIDE FOR COMPARING PAYMENT PROCESSING SERVICES INTRODUCTION When it comes to credit card processing, no provider is perfect, but like any service, the company you choose should be efficient, accurate, and affordable. Use this information and these tips when shopping for a company to process credit cards for your association to ensure your organization is getting the whole picture when it comes to the “small print.” TABLE OF CONTENTS Who’s Who in Credit Card Transactions? ....................................1 Understand the Roles Each Component Plays ............................ 2 Understand Cost Categories ................................................... 3 Understand the Hard and Soft Costs ......................................... 4 Security and Risk Management ................................................ 5 Do Your Research ................................................................... 6 Simplify Instead ..................................................................... 7 Conclusion ............................................................................ 8 www.growthzone.com HOW TO SELECT AN ASSOCIATION CREDIT CARD PROCESSOR WHO’S WHO IN CREDIT CARD TRANSACTIONS? 1 Here is a glossary of terms commonly used regarding credit card processing. CARDHOLDER (THE MEMBER) MERCHANT (THE ASSOCIATION) MERCHANT SERVICE The person who pays for goods A business
    [Show full text]